Page 3 of 15 results (0.015 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0425.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0437.html http://archives.neohapsis.com/archives/freebsd/2000-09/0108.html http://www.securityfocus.com/bid/1646 http://www.securityfocus.com/bid/1687 https://exchange.xforce.ibmcloud.com/vulnerabilities/5223 •

CVSS: 10.0EPSS: 2%CPEs: 2EXPL: 0

Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-036.0.txt http://www.novell.com/linux/security/advisories/suse_security_announce_36.html http://www.securityfocus.com/bid/810 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9911171818220.12375-100000%40ray.compu-aid.com •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 1

Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine. • http://www.novell.com/linux/security/advisories/pine_update_announcement.html http://www.novell.com/linux/security/advisories/suse_security_announce_6.html http://www.securiteam.com/unixfocus/HHP-Pine_remote_exploit.html http://www.securityfocus.com/bid/1247 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook. Desbordamiento de buffer en clientes de correo, como Solaris mailtool y Outlook • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-008 •

CVSS: 4.6EPSS: 0%CPEs: 3EXPL: 0

Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail. • http://marc.info/?l=bugtraq&m=87602167419803&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/416 •